Data Loss Prevention Best Practices: Managing Sensitive Data in the Enterprise

  • Source: IronPort
  • Written By:
  • Published:
  • (Originally Published On:) )
While a great deal of attention has been given to protecting companies’ electronic assets from outside threats, organizations must now turn their attention to an equally dangerous situation: data loss from the inside. Given today’s strict regulatory standards, data loss prevention (DLP) has become one of the most critical issues facing executives. Fortunately, effective technical solutions are now available that can help.

Featured Software Research:

Expert’s Guide to Successful MRP Projects

To succeed in their tasks, planners and schedulers rely on materials resource planning (MRP) software to make recommendations and send signals. To make meaningful suggestions, MRP requires a steady diet of accurate, relevant, and timely data. This guide breaks down two critical MRP project success factors: 1) tips to select the right MRP software, and 2) best practices to extract meaningful value from MRP solutions. Read More

Best Practices for Managing Just-in-time (JIT) Production

Just-in-time (JIT) manufacturing “is not procrastination, but making a commitment once the scales are tipped in the favor of certainty.” How do you keep your company from falling prey to the “deer-in-the-headlights” syndrome and suffering from decision failures? In this guide, experts share their top seven best practices for deftly managing JIT manufacturing. Read More

You may also be interested in these related documents:

2012 Business Data Loss Survey results

This report on the Cibecs and IDG Connect 2012 business data loss survey uncovers the latest statistics and trends around enterprise data protection. Download the full results now. Read More

5 Best Practices for Managing Security on Mobile Devices

As smartphones and tablet computing devices get their foot in the enterprise door, companies are finding themselves at a much higher risk of data breach and loss. In order to mitigate this risk, Focus Experts Amy Babinchak, Martyn Davies, Bob Egan, Rasib Hassan Khan, Josh Lipton, and Ken Wineberg offer their top 6 best practices for managing security on mobile devices. Read More

Best Practices Managing Mobile Telecom Services for 2010

This report was drawn from a series of six webinars that Comview commissioned from the fall of 2009 to spring 2010. The material presented here is like a “greatest hits.” It includes some of the most popular best practices for managing mobile telecom services. It also includes significant new additions. The new material comes from updated survey data on enterprise mobility practices and recent industry developments. Read More
 
comments powered by Disqus